nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A lossless quantization approach for physical-layer key generation in vehicular ad hoc networks based on received signal strength
|
Abdelazeem, Ibraheem |
|
|
49 |
C |
p. |
artikel |
2 |
An efficient heterogeneous online/offline anonymous certificateless signcryption with proxy re-encryption for Internet of Vehicles
|
Hundera, Negalign Wake |
|
|
49 |
C |
p. |
artikel |
3 |
An identity authentication and key agreement protocol for the internet of vehicles based on trusted cloud-edge-terminal architecture
|
Tian, Jun-feng |
|
|
49 |
C |
p. |
artikel |
4 |
An intelligent clustering scheme based on whale optimization algorithm in flying ad hoc networks
|
Hosseinzadeh, Mehdi |
|
|
49 |
C |
p. |
artikel |
5 |
A novel Q-learning-based secure routing scheme with a robust defensive system against wormhole attacks in flying ad hoc networks
|
Hosseinzadeh, Mehdi |
|
|
49 |
C |
p. |
artikel |
6 |
A robust multi-stage intrusion detection system for in-vehicle network security using hierarchical federated learning
|
Althunayyan, Muzun |
|
|
49 |
C |
p. |
artikel |
7 |
ASAP: IEEE 802.11ax-based seamless access point handover for moving vehicles
|
Lv, Pin |
|
|
49 |
C |
p. |
artikel |
8 |
Assessing the impact of communication delays for Autonomous Intersection Management systems
|
Wang, Michael I.-C. |
|
|
49 |
C |
p. |
artikel |
9 |
Broadcast signcryption scheme with equality test in smart transportation system
|
Niu, Shufen |
|
|
49 |
C |
p. |
artikel |
10 |
Conditional privacy-preserving and efficient distributed IoV data sharing scheme based on a hierarchical and zonal blockchain
|
Zhou, Ziyu |
|
|
49 |
C |
p. |
artikel |
11 |
Cost-aware task offloading in vehicular edge computing: A Stackelberg game approach
|
Wang, Shujuan |
|
|
49 |
C |
p. |
artikel |
12 |
Discharging driven energy sharing protocol for V2V communication in vehicular energy networks
|
Tang, Qinghua |
|
|
49 |
C |
p. |
artikel |
13 |
Efficiency of UAV-assisted cellular networks under jamming scenarios
|
Arif, Mohammad |
|
|
49 |
C |
p. |
artikel |
14 |
Evaluating energy harvesting UAV-NOMA network with random user pairing in the finite blocklength regime
|
Thapliyal, Shardul |
|
|
49 |
C |
p. |
artikel |
15 |
FedGen: Federated learning-based green edge computing for optimal route selection using genetic algorithm in Internet of Vehicular Things
|
Khatua, Sushovan |
|
|
49 |
C |
p. |
artikel |
16 |
Fully distributed multi-agent processing strategy applied to vehicular networks
|
de Lima, Vladimir R. |
|
|
49 |
C |
p. |
artikel |
17 |
GASBO: User grouping–based gradient average subtraction–based optimisation for NOMA-based fog computing vehicular network
|
Kumara Narayana Swamy, C |
|
|
49 |
C |
p. |
artikel |
18 |
HCFAIUN: A novel hyperelliptic curve and fuzzy extractor-based authentication for secure data transmission in IoT-based UAV networks
|
Sharma, Jatin |
|
|
49 |
C |
p. |
artikel |
19 |
Hybrid cryptography-based scheme with conditional privacy-preserving authentication and memory-based DOS resilience in V2X
|
Imghoure, Abdelkrim |
|
|
49 |
C |
p. |
artikel |
20 |
IDS-DEC: A novel intrusion detection for CAN bus traffic based on deep embedded clustering
|
Shi, Jiahao |
|
|
49 |
C |
p. |
artikel |
21 |
Markov-reward based estimation of the idle-time in vehicular networks to improve multimetric routing protocols
|
Martin-Faus, Isabel V. |
|
|
49 |
C |
p. |
artikel |
22 |
Multi-path serial tasks offloading strategy and dynamic scheduling optimization in vehicular edge computing networks
|
Liu, Xiangyan |
|
|
49 |
C |
p. |
artikel |
23 |
On a security scheme against collusive attacks in vehicular ad hoc networks
|
Fan, Na |
|
|
49 |
C |
p. |
artikel |
24 |
Physical layer security in SWIPT-based cooperative vehicular relaying networks
|
Odong, Patrick |
|
|
49 |
C |
p. |
artikel |
25 |
S-LDM: Server local dynamic map for 5G-based centralized enhanced collective perception
|
Risma Carletti, C.M. |
|
|
49 |
C |
p. |
artikel |
26 |
State-of-the-art authentication and verification schemes in VANETs: A survey
|
Mazhar, Sheraz |
|
|
49 |
C |
p. |
artikel |
27 |
Subchannel assignment for social-assisted UAV cellular networks using dynamic hypergraph coloring
|
Gouda, Kanhu Charan |
|
|
49 |
C |
p. |
artikel |
28 |
Vehicular network anomaly detection based on 2-step deep learning framework
|
Kushardianto, Nur Cahyono |
|
|
49 |
C |
p. |
artikel |
29 |
VESecure: Verifiable authentication and efficient key exchange for secure intelligent transport systems deployment
|
Surapaneni, Praneetha |
|
|
49 |
C |
p. |
artikel |